Threat HUNTing Platform
Credential Risk Assessment and Remediation
ORKOS: Preventing the 9 steps to domain collapse
R9B understands the cognitive aspects of cyber operations. Our curriculum provides the hands-on technical skills students require to attain a variety of advanced cybersecurity qualifications. We instill the knowledge, skills, and abilities necessary for our students to defeat the adversary. Below are our available courses. Please check back often as our course offerings are updated regularly. Government organizations, please contact R9B directly via training@root9B.com for pricing and purchasing information.
Using passive technology is not enough to defeat cyberattackers, according to the experts at root9B (R9B)–active adversary pursuit is required.
Military speak is no longer reserved for members of the world’s armed forces—terms like attack surface and kill chain are now being promoted by commercial cybersecurity experts with good reason. Simply put, very little—with the possible exception of scale—differentiates a cyber conflict between nation states and one between businesses and cybercriminals.
Eric Hipkins, a security and intelligence professional with over 25 years of experience in the military and National Security Agency, is one such expert. When asked why adversaries seem to be having their way with over 1,700 major data breaches reported in 2017, Hipkins suggests current technology-based cyber defenses are unable to stave off attacks because:
This article was originally posted by The Tech Republic. Click here to view on their site.
BACK TO NEWSROOM